-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes [C]
-
August 19-22 1984 Santa Barbara, CA, USA
-
SHAMIR A. Identity-Based Cryptosystems and Signature Schemes [C]//Proceedings of CRYPTO 84 on Advances in Cryptology: August 19-22, 1984. Santa Barbara, CA, USA, 1985, 196: 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues [C]
-
December 17-19 Cirencester, UK 2001
-
COCKS C. An Identity Based Encryption Scheme Based on Quadratic Residues [C]//Proceedings of the 8th IMA International Conference on Cryptography and Coding: December 17-19, 2001. Cirencester, UK, 2001, 2260: 360-363.
-
(2001)
Proceedings of the 8th IMA International Conference on Cryptography and Coding
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
3
-
-
0037623983
-
Identity-based encryption from the weil pairing [J]
-
BONEH D, FRANKLIN M K. Identity-Based Encryption from the Weil Pairing [J]. SIAM Journal on Computing, 2003, 32(3): 586-615.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
0345490607
-
Certificateless public key cryptography [C]
-
November 30-December 4 Taipei, Taiwan, China 2003
-
AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography [C]//Proceedings of ASIACRYPT 2003: November 30-December 4, 2003. Taipei, Taiwan, China, 2003: 452-473.
-
(2003)
Proceedings of ASIACRYPT 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
7
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption)
-
Advances in Cryptology - CRYPTO '97
-
ZHENG Yuliang. Digital Signcryption or How to Achieve Cost (Signature & Encryption)? Cost (Signature)+Cost (Encryption) [C]//Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'97): August 17-21, 1997. Santa Barbara, California, USA, 1997: 165-179. (Pubitemid 127112551)
-
(1997)
Lecture Notes In Computer Science
, Issue.1294
, pp. 165-179
-
-
Zheng, Y.1
-
8
-
-
62449111027
-
Certificateless signcryption [C]
-
March, 18-20 Tokyo, Japan 2008
-
BARBOSA M, FARSHIM P. Certificateless Signcryption [C]//Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS'08): March, 18-20, 2008. Tokyo, Japan, 2008: 369-372.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)
, pp. 369-372
-
-
Barbosa, M.1
Farshim, P.2
-
9
-
-
33947512019
-
Formal proofs for the security of signcryption [J]
-
BAEK J, STEINFELD R, ZHENG Yuliang. Formal Proofs for the Security of Signcryption [J]. Journal of Cryptology, 2007, 20(2): 203-235.
-
(2007)
Journal of Cryptology
, vol.20
, Issue.2
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
11
-
-
24144498013
-
Improved identity-based signcryption [C]
-
January 23-26 Les Diablerets, Switzerland 2005
-
CHEN Liqun, MALONE-LEE J. Improved Identity-Based Signcryption [C]//Proceedings of the 8th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005): January 23-26, 2005. Les Diablerets, Switzerland, 2005, 3386: 362-379.
-
(2005)
Proceedings of the 8th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005)
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
12
-
-
70449102675
-
Certificateless signcryption scheme in the standard model [J]
-
LIU Zhenhua, HU Yupu, ZHANG Xiangsong, et al. Certificateless Signcryption Scheme in the Standard Model [J]. Information Sciences, 2012, 180(3): 452-464.
-
(2012)
Information Sciences
, vol.180
, Issue.3
, pp. 452-464
-
-
Liu, Z.1
Yupa, H.U.2
Zhang, X.3
-
13
-
-
85006710822
-
Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing [C]
-
December 12-15 Beijing, China 2011
-
SHARMILA DEVA SELVI S, SREE VIVEK S, PANDU RANGAN C. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing [C]//Proceedings of the 5th International Conference on Information Security and Cryptology (Inscrypt'09): December 12-15, 2009. Beijing, China, 2011, 6151: 75-92.
-
(2009)
Proceedings of the 5th International Conference on Information Security and Cryptology (Inscrypt'09)
, vol.6151
, pp. 75-92
-
-
Sharmila Deva Selvi, S.1
Sree Vivek, S.2
Pandu Rangan, C.3
-
14
-
-
79959951878
-
Cryptanalysis of an elliptic curve-based signcryption scheme [J]
-
TOORANI M. Cryptanalysis of an Elliptic Curve-Based Signcryption Scheme [J]. International Journal of Network Security, 2012, 10(1): 51-56.
-
(2012)
International Journal of Network Security
, vol.10
, Issue.1
, pp. 51-56
-
-
Toorani, M.1
-
15
-
-
62449298276
-
A new efficient certificateless signcryption scheme [C]
-
December 20-22 Shanghai, China 2008
-
WU C H, CHEN Zhixiong. A New Efficient Certificateless Signcryption Scheme [C]//Proceedings of International Symposium on Information Science and Engineering 2008 (ISISE'08): December 20-22, 2008. Shanghai, China, 2008, 1: 661-664.
-
(2008)
Proceedings of International Symposium on Information Science and Engineering 2008 (ISISE'08)
, vol.1
, pp. 661-664
-
-
Wu, C.H.1
Chen, Z.2
-
16
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
PII S0020019098001677
-
ZHENG Yuliang, IMAI H. How to Construct Efficient Signcryption Schemes on Elliptic Curves [J]. Information Processing Letters, 1998, 68: 227-233. (Pubitemid 128379473)
-
(1998)
Information Processing Letters
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
17
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
MAMBO M, USUDA K, OKAMOTO E. Proxy Signatures: Delegation of the Power to Sign Messages [J]. IEICE Transacti ons on Fundamentals 1996, E79-A(9): 1338-1353. (Pubitemid 126763603)
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
19
-
-
20244388769
-
An efficient scheme for secure message transmission using proxy-signcryption [C]
-
January 1999 Auckland, New Zealand
-
GAMAGE C, LEIWO J, ZHENG Yuliang. An Efficient Scheme for Secure Message Transmission Using Proxy-Signcryption [C]//Proceedings of the 22nd Australasian Computer Science Conference: January, 1999. Auckland, New Zealand, 1999: 420-431.
-
(1999)
Proceedings of the 22nd Australasian Computer Science Conference
, pp. 420-431
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
20
-
-
26444616640
-
Efficient identity based proxy-signcryption schemes with forward security and public verifiability
-
Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
-
WANG Meng, LI Hui, LIU Zhijing. Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability [C]//Proceedings of the Third International Conference on Networking and Mobile Computing (ICCNMC 2005): August 2-4, 2005. Zhangjiajie, China, 2005: 982-991. (Pubitemid 41435839)
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 982-991
-
-
Wang, M.1
Li, H.2
Liu, Z.3
-
21
-
-
23044435243
-
Efficient implementation of pairing-based cryptosystems [J]
-
BARRETO P S L M, LYNN B, SCOTT M. Efficient Implementation of Pairing-Based Cryptosystems [J]. Journal of Cryptology, 2004, 17(4): 321-334.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 321-334
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
23
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [C]
-
November 27-28 Seoul, Korea 2004
-
CHOW S S M, YIU S M, LUCAS C K, et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity [C]//Proceedings of the 6th International Conference on Information Security and Cryptology (ICISC-2003): November 27-28, 2003. Seoul, Korea, 2004: 352-369.
-
(2003)
Proceedings of the 6th International Conference on Information Security and Cryptology (ICISC-2003)
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Lucas, C.K.3
|